General operating rules and notes

  • The SSH server may challenge the client to authenticate itself depending on the authentication methods configured on the destination SSH server. The client first tries the "none" method of authentication; if that is unsuccessful, it examines the list of supported authentication methods from the server, if provided. If the server does not provide such a list, all methods of authentication will be tried in the following order until the session is successfully opened or rejected by the server:
    • Authentication method "publickey", if a private key has been loaded onto the switch.

    • Authentication method "password".

  • During "public-key" authentication, the client must use its private key to authenticate itself to the server. There can be only one key pair on the switch for the manager.

  • The private key should be passphrase protected for highest security; the user is prompted to enter the passphrase.

  • The private key can be configured by copying it to the SSH client switch, using the copy command.

  • If the public-key authentication fails or the client has not been configured with a key pair, the "password" method of authentication is used and the user is prompted for a password.

  • Successful TACACS or RADIUS logins will give the user either operator or manager privileges. This is important if there are chained SSH sessions.